@incollection{, AC790A1AF482722EED56AFC138327CAA , note={received Masters degree in Computer Applications from the University of Kashmir.} , author={{Muneer AhmadDar} and {JavaidParvez} and {National Institute of Electronics and Information Technology (NIELIT) Srinagar/Jammu}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1312915 } @incollection{b0, , title={{}} , journal={{Google bets on Android future}} } @incollection{b1, , title={{Towards Hierarchical Security Framework for Smartphones}} , author={{ HongweiLuo } and { ? ? } and { GuiliHe } and { ? } and { XiaodongLin } and { § } and { Xuemin(Sherman) Shen } and { ? }} , booktitle={{First IEEE International Conference on Communications in China: Communications Theory and Security}} , publisher={CTS} 2012 } @book{b2, , title={{Pro Android Python with SL4A}} , author={{ P }} , year={2011} , note={Exploring the android api} } @incollection{b3, , title={{A proposal to realize the provision of secure Android applications}} , author={{ HarunobuAgematsu } and { JunyaKani } and { KoheiNasaka } and { HideakiKawabata }} , booktitle={{IEEE 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing}} } @incollection{b4, , title={{Mobile phone vulnerabilities: a new generation of malware}} , author={{ JJamaluddin } and { NZotou } and { PCoulton }} , booktitle={{IEEE International Symposium on}} , publisher={IEEE} , year={2004. 2004} , note={Consumer Electronics} } @book{b5, , author={{ WilliamEnck } and { PeterGilbert } and { Byung-GonChun } and { LandonPCox } and { JaeyeonJung } and { PatrickMcdaniel } and { AnmolNSheth }} , title={{TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Symposium on Operating Systems Design and implementation (OSDI'10)}} , publisher={Canada} , year={2010} } @incollection{b6, , title={{Restriction framework for Android application -Whitelist-based installation}} , author={{ KeisukeTakemori } and { HideakiKawabata } and { TakamasaIsohara } and { AyumuKubota } and { JyunichiIkeno }} , booktitle={{of Japan) SIG (The Special Interest Group) technical reports}} , publisher={The Information Processing Society} , year={2011} , note={in Japanese} } @book{b7, , author={{ HideakiKawabata } and { TakamasaIsohara } and { KeisukeTakemori } and { AyumuKubota }} 2011-CSEC-53-3 , title={{Threat of Script abuse Android Permissions and Static Analysis}} , year={2011} , note={IPSJ SIG technical reports. in Japanese} } @incollection{b8, , title={{A survey of mobile malware in the wild}} , author={{ AFelt } and { MFinifter } and { EChin } and { SHanna } and { DWagner }} , booktitle={{Proceedings of the 1st ACM workshopon Security and privacy in smartphones and mobile devices}} the 1st ACM workshopon Security and privacy in smartphones and mobile devices } @incollection{b9, , title={{Security Controls for Android}} , author={{ Ruben Jonathan GarciaVargas }} , journal={{IEEE Fourth International Conference on Computational Aspects of Social Networks}} 215 , year={2012} , publisher={CASoN} } @book{b10, , title={{application development: Programming with the Google SDK}} , author={{ RRogers } and { JLombardo } and { ZMednieks } and { BMeike }} , year={2009} , publisher={Reilly Media, Inc} } @incollection{b11, , title={{Smart-phone attacks and defenses}} , author={{ CGuo } and { HWang } and { WZhu }} , booktitle={{HotNets III}} , year={2004} } @incollection{b12, , title={{Mobile Phones as Computing Devices: the Viruses Are Coming}} , author={{ CDagon } and { TMartin } and { TStarner }} , journal={{IEEE Pervasive Computing}} 3 4 , year={2004} } @incollection{b13, , title={{Smart smartphone development: ios versus android}} , author={{ MGoadrich } and { MRogers }} , booktitle={{Proceedings of the 42nd ACM technical symposium on Computer science education}} the 42nd ACM technical symposium on Computer science education , publisher={ACM} , year={2011} } @book{b14, , title={{}} , author={{ Selinux Project } and { Seandroid }} , year={August 2012} } @incollection{b15, , title={{Performance analysis of intrusion detection systems for smartphone security enhancements}} , author={{ SSalah } and { SAbdulhak } and { HSug } and { DKang } and { HLee }} , booktitle={{2011 International Conference on}} , publisher={IEEE} , year={2011} , note={in Mobile IT Convergence (ICMIC} } @book{b16, , author={{ MPelino }} , title={{Predictions 2010: Enterprise Mobility Accelerates Again}} Forrester , year={2009} } @book{b17, , title={{Securely deploying Android devices}} , author={{ AngelAlonso Parrizas } and { Sans Institute }} , year={September 2011} } @book{b18, , title={{SmartPhone Malware: The danger and protective strategies}} , author={{ LJeter } and { MMani } and { TReinschmid }} , year={2011 August.[20. 2011} , note={Android Security Overview} } @book{b19, , title={{SELinux Mailing List, Mailing List Archives (marc.info)}} , author={{ SSmalley }} l=selinux&m=132588456202123&w =2. 21 , year={January 2012} National Security Agency , note={SEAndroid Project Page} } @incollection{b20, , title={{On lightweight mobile phone application certification}} , author={{ WEnck } and { MOngtang } and { PMcdaniel }} , booktitle={{Proceedings of the 16th ACM conference on Computer and Communications Security}} the 16th ACM conference on Computer and Communications Security , publisher={ACM} , year={2009} } @incollection{b21, , title={{Scandroid: Automated security certification of android applications}} , author={{ AFuchs } and { AChaudhuri } and { JFoster }} , journal={{Manuscript, Univ. of Maryland}} } @incollection{b22, , title={{Apex: Extending android permission model and enforcement with user-defined runtime constraints}} , author={{ MNauman } and { SKhan } and { XZhang }} , booktitle={{Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security}} the 5th ACM Symposium on Information, Computer and Communications Security , publisher={ACM} , year={2010} } @incollection{b23, , title={{Porscha: Policy oriented secure content handling in android}} , author={{ MOngtang } and { KButler } and { PMcdaniel }} , booktitle={{Proceedings of the 26 th Annual Computer Security Applications Conference}} the 26 th Annual Computer Security Applications Conference , publisher={ACM} , year={2010} } @book{b24, , title={{Crepe: Context-related policy enforcement for android}} , author={{ MConti } and { VNguyen } and { BCrispo }} , year={2011} , note={Information Security} } @book{b25, , title={{Xmandroid: A new android evolution to mitigate privilege escalation attacks}} , author={{ SBugiel } and { LDavi } and { ADmitrienko } and { TFischer } and { ASadeghi }} TR-2011-04 , year={April. 2011} Technische Universit¨at Darmstadt , note={Tech. Rep} }